Use _NS_4445425547 or NS🐞 for enables debuggging panel. When enabled it, a ladybug 🐞 menu appears in the app menu bar.
“4445425547” means DEBUG in Unicode table.
0x44=D
0x45=E
0x42=B
0x55=U
0x47=G
| // | |
| // Process+InteractiveEscalation.swift | |
| // | |
| // | |
| // Created by Stephan Casas on 6/26/24. | |
| // | |
| import Foundation; | |
| import OSAKit; |
| [ | |
| "928350122843193385", | |
| "1185047194261274665", | |
| "956202276408688650", | |
| "956104664821157918", | |
| "1185047092478095443", | |
| "1185046791826178099", | |
| "1185047045413797898", | |
| "928483283698851901", | |
| "1185047444619284641", |
Some notes, tools, and techniques for reverse engineering macOS binaries.
| /* | |
| * Copyright (C) 2023 Daniel Levi | |
| * | |
| * Originally based on Apple's header for WebKit. The file within this repo | |
| * named LICENSE_APPLE contains the copyright notice provided by Apple | |
| * | |
| * This header is based on my own disassembly of libMobileGestalt and contains | |
| * 760 keys that should support any iOS version up until iOS 17. | |
| * | |
| */ |
| #!/bin/zsh | |
| ext_root_path=~/Library/Application\ Support/Google/Chrome/Default/Extensions | |
| find "$ext_root_path" -name "manifest.json" -print0 | while IFS= read -r -d '' file; do echo "\033[1;33m$file\033[0m"; echo "-----------------"; cat "$file" | nl -n ln | GREP_COLOR='01;30' grep --color=always '.*'; echo "-----------------"; done | |
| # Prompt the user for the working directory path which is chrome extension root | |
| read -p "Enter the chrome extension path(for example difoiogjjojoaoomphldepapgpbgkhkb/2.7.7_0): " workdir | |
| # Prompt the user for the result app name | |
| read -p "Enter the desired app name: " app_name |
The ecosystem of iOS [jailbreaks][1] has remained largely unchanged since iOS 1.0 even though the system internals of iOS has undergone several evolutions, enhancing security and enabling new features. iOS jailbreaks traditionally involves neutering a significant portion of the OS's security in order to enable unsigned code execution ("apps") and system modifications ("tweaks"). This allows [malware][2] to target jailbroken users and for misbehaving apps to corrupt data.
| /System/Library/Frameworks/CoreServices.framework/Frameworks/LaunchServices.framework/Versions/A/Support/lsregister -dump | grep uti: | cut -c 29- | sort | uniq > utis.txt |
| class FloatingPanel: NSPanel { | |
| init(contentRect: NSRect, backing: NSWindow.BackingStoreType, defer flag: Bool) { | |
| // Not sure if .titled does affect anything here. Kept it because I think it might help with accessibility but I did not test that. | |
| super.init(contentRect: contentRect, styleMask: [.nonactivatingPanel, .resizable, .closable, .fullSizeContentView], backing: backing, defer: flag) | |
| // Set this if you want the panel to remember its size/position | |
| // self.setFrameAutosaveName("a unique name") | |
| // Allow the pannel to be on top of almost all other windows |